Skip to main content (Press Enter).
U.S. Air Force Logo
Home
Environment
Community Engagement
Honorary Commanders
About Us
Biographies
Emergency Management
CAF
SAPR
ADAPT
Helping Matrix
Base Directory
Questions
We Care
Home Life
Victim Support Services
Mental Wellness
Workplace
Physical Wellness
Financial Wellness
Units
Honor Guard Requests
Contact Us
Visitor Control Center
CAC/ID Card & DEERS Updates
Sexual Misconduct Disciplinary Actions
Dover AFB'S Area Defense Council
Dover Air Force Base
DAF EXECUTIVE ORDER IMPLEMENTATION
Eagle Bulletin Board
Public Affairs Support
News
Team Dover Newcomers
About Us
DVIDSVideoPlayer
Playlist:
Search Results
Video by Steven Stover
Player Embed Code:
Download
Embed
Share
AvengerCon VIII: Should the Army Lead with Threat Intelligence or Compliance-Driven Security Programs
780th Military Intelligence Brigade (Cyber)
Feb. 29, 2024 | 18:03
Presented by Karlo Arozqueta
Synopsis:
An ever-growing number of DoD leaders have become frustrated with the burdensome and arduous RMF and ATO process. They have been asking, “Is there a better way?”. While cyber compliance policy will always remain critical, there is acknowledgment that an intelligence-led security approach is more nimble and cost-effective. As a result, some organizations are pivoting from event-driven cybersecurity syndrome (where alerts, incidents, breaches, audits, compliance, and privacy take precedence), to an approach that embraces cyber insights, signals, and intelligence as guiding principles.The Google Mandiant team will discuss unique approaches to data intelligence gathering, research, curation, and dissemination solutions. These intelligence subscriptions enable services to obtain unique threat actor data as they continuously navigate towards an even stronger cybersecurity posture.
Boiler:
AvengerCon VIII is complete! We had over five hundred attendees, including hundreds remotely, as well as more than thirty presentations, and half a dozen villages.
Thank you everyone who attended, to our dedicated volunteers, and to our friends at the Georgia Cyber Center, CyberFIC, ArCTIC, and ACI! Without all of you this event wouldn't have been what it is, and we're looking forward to seeing you next time!
AvengerCon is a free security event organized by volunteers from the U.S. Army’s 780th Military Intelligence Brigade (Cyber) to benefit the hackers of the U.S. Department of Defense community. The event is open to all DoD service members and employees, and related partners supporting cyberspace missions. AvengerCon features presentations, hacker villages, training workshops, and much more.
The views expressed are those of the presenter, and do not reflect the official position of the 780th Military Intelligence Brigade (Cyber), the Department of the Army, or Department of Defense.
https://www.army.mil/article/274161/avengercon_viii_army_cybers_homegrown_hacker_con_returns
More
Tags
Army Cyber
AvengerCon VIII
More
Up Next
23:34
AvengerCon VIII: Steganography: Nothing To See Here! (updated)
2:40
AvengerCon VIII - Capt. Jacob HeyBey
27:34
AvengerCon VIII: Six Years Later: Spectre, Meltdown, and the Relevance of Hardware Security
43:27
AvengerCon VIII: Information Operations Tactics of "Pig Butchering" Scam Rings
35:06
AvengerCon VIII: Laundering Information: Building Perceived Legitimacy
38:26
AvengerCon VIII: An intern's journey in Evading EDRs
33:00
AvengerCon VIII: Hiding in Plain Sight: Tracking Malware Abusing Web Applications
38:39
AvengerCon VIII: Cyber: The Next Generation
27:22
AvengerCon VIII: Collective Cyber Defense: Getting From Theory to Reality
32:31
AvengerCon VIII: Blockchain Forensics and Incident Response
33:50
AvengerCon VIII: AdTech and Military-Friendly Banks – Data Vulnerabilities for Servicemembers, Families, and Veterans
39:32
AvengerCon VIII: WO Panel: Hacking Cyber Operations and Network Defender Training, A Bold Step Toward Army Modernization.
36:43
AvengerCon VIII: Big Game Hunting - Scanning the Internet for Malware
29:39
AvengerCon VIII: Homestation Training as Code: a framework to define, build, and use code-driven technical training materials
Now Playing
AvengerCon VIII: Should the Army Lead with Threat Intelligence or Compliance-Driven Security Programs
More Videos